General

  • Target

    P04356.zip

  • Size

    887KB

  • Sample

    241008-p1r1caxhkq

  • MD5

    c79c4d80744795a5ba20da37f2638216

  • SHA1

    4eed3bdc319d3e65344f7acd09db83d5e4bb1d57

  • SHA256

    14fa988747a313c09bbc60596d4262c1a8bd653cf982acc836b056d545323e66

  • SHA512

    e65be81bbff1e4ae75c26ea3c887d4eaa2854caf69cb56afb2c36653086a8af348342b9a9199570c1f43959ead474db7e8acfb6c3c81507544e16dd39ded2dee

  • SSDEEP

    24576:0bVUUtjeAz7rSf6iFUSl58qdH8b2wdAWa81Goo:iXt6cSfoSb8ZbFiWa1oo

Malware Config

Extracted

Family

remcos

Botnet

splendid

C2

wasxc.ddns.net:5809

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-GQQEAY

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Targets

    • Target

      2i8muV3YUdasYZi.bat

    • Size

      957KB

    • MD5

      503634aab271a373dc2aa561c3f41c9f

    • SHA1

      5a69b7351c1ab3b10f440e8e4f85476269e908d8

    • SHA256

      e91003d89bef3f5c6bdfb6a554ca0cf7e05d209cf0184cb545f84ce1a3d04159

    • SHA512

      8e59d88e95b7f601224dbc8d3b8a3c06eb899ec96d6c84479e3c618173d3e14e2f691c908f530447d87c7e17dbbad1ce259f579401272b77b84bbdaddb234697

    • SSDEEP

      24576:Mq6EOjecgRrD6qTc8ZNUgJbejCwJsKx7X:MqtO6VDy8TUljxqKxT

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks